Yeah, Your steps ar correct. Let's analyse those steps more easily by the following steps:

Freeze panes is a feature in spreadsheet applications, such as Microsoft Excel, LibreOffice Calc, and Google Sheets. It "freezes" a row or column, so that it is always displayed, even as you navigate the spreadsheet.
❍ Freezing panes is especially useful if your spreadsheet has a header row, that you want to always be visible.
- Select the row below the row(s) you want to freeze. In our example, we want to freeze rows 1 and 2, so we'll select row.
- Click the View tab on the Ribbon.
- Select the Freeze Panes command, then choose Freeze
- Panes from the drop-down menu. ...
- The rows will be frozen in place, as indicated by the gray line.
<u>━━━━━━━━━━━━━━━━━━━━</u>
Answer:
<em>Ethernet cables, Network Adapters, Modem, Routers, Switches.</em>
Explanation:
<em>The devices that are required in setting up a wired network for the 5 computer comprises of the following devices </em>
- <em>Ethernet Cables</em>
- <em>Network Adapters</em>
- <em>Modem/Router</em>
- <em>Network Switch</em>
<em>Ethernet cables: They are called network cables or RJ-45 cables used to in connecting two or more computers together. it has different categories called, the untwisted pair and twisted pair Ethernet, with a speed from 10-1000</em>
<em>Network Adapters : This adapters allows a computer device to connect and interface with a network computer</em>
<em>Modem/Routers : A router is a device that that sits in the middle between your local computers and modems. it takes receives information or gets information from the modem and delivers it to the computer</em>
<em>Network switch: it connects more than two computers together to a network and share data among themselves and other devices on the network</em>
<span>As programs and online activities have grown more robust and innovative, it has simultaneously required computer manufacturers to identify ways to make their devices faster to keep up with these changes. Users benefit immensely due to their ability to have boundless and efficient access to their various needs.</span>
The question is incomplete as the scenarios are not given that were to be matched by the given encryption algorithms.
By finding the question from internet i have attached the image of the scenarios in the form of table and answered below accordingly
<h2>
Answer:</h2>
<u>Scenario A:</u>
Advanced Encryption Standard (AES) is a technique that uses 256-bit cipher texts for encryption process. The data encrypted by AES cannot be attacked and even it cannot be decrypted unless a brute-force search is used through all of possible 256-bit keys.For mobile security it is known as one of the best algorithms.
<u>Scenario B:</u>
Following are the techniques of encryption used for given scenario:
- ECC
- Digital Signature
- AES
- Blowfish
<u>Scenario C:</u>
Following are the techniques of encryption used for given scenario:
<u>Scenario D:</u>
Secure Sockets Layer (SSL) - SSL is a protocol that is commonly-used for managment of the message transmission security over the Internet)
<u>Scenario E:</u>
Advanced Encryption Standard (AES) - AES is an encryption algorithm used by U.S. Government agencies for securing sensitive but unclassified material .
i hope it will help you!
Answer: Even though the hardware is inexpensive the writing of program is not efficient through this method as proper development of program is necessary for the clear execution due to factors like:-
- The facility of writing program even the cost of hardware is less but it is not a free facility.
- It also has a slower processing for the execution of the program
- The construction of the efficient program is necessary for the compilation and execution of it rather than poorly constructed program is worthless and inefficient in working.